Company Details
consonus-healthcare
901
5,351
62
consonushealth.com
0
CON_1739949
In-progress


Consonus Healthcare Company CyberSecurity Posture
consonushealth.comConsonus Rehab is a contract rehab provider, and part of the Marquis Companies family. Our organizations consist of four major divisions: Consonus Rehab, Consonus Pharmacy, Marquis Companies & AgeRight Care at Home. Consonus supports a culture of integrity and meaningful purpose. Our dedication to physical, mental, social, and spiritual health carries throughout every level of our company, from executives to therapist. Giving back to the community has always been a significant part of the Consonus Rehab philosophy. Bringing the causes we support to the forefront is important to us, and that’s why we’ve formed the Vital Life Foundation. Consonus Rehab and Pharmacy – www.consonushealth.com Marquis and Marquis At Home – www.marquiscompanies.com Vital Life Foundation- www.vitallifefoundation.org Consonus Rehab: Therapy is much more than a job—but you already know that. You’re in the business of making people’s lives better. Consonus Rehab Services is a contract therapy company that sets up therapy departments in post-acute settings. Our employees can find full time, part time or on call/per diem positions working in an acute, outpatient, inpatient or skilled nursing setting. We can help you find the right opportunity where you can make the biggest difference in people’s lives. Consonus Pharmacy: At Consonus Pharmacy we look at ourselves through an atypical lens. We aren’t pill counters, we're people lovers. More than just order fillers, we treat diseases. Every day employees arrive ready to be flawless, ready to serve and ready to make a difference in patients lives. At Consonus, you’ll work with expert and efficient staff, as well as the latest technology to make for a smooth, precise operation and accurate delivery of medications.
Company Details
consonus-healthcare
901
5,351
62
consonushealth.com
0
CON_1739949
In-progress
Between 650 and 699

Consonus Healthcare Global Score (TPRM)XXXX

Description: AgeRight Clinical Services Suffers Data Breach Impacting Nearly 5,000 Individuals On November 21, 2025, AgeRight Clinical Services, a healthcare provider specializing in senior care, disclosed a data breach affecting 4,897 individuals after detecting unauthorized access to its systems. The breach occurred over a month-long period, from August 9 to September 10, 2025, though the exact method of intrusion remains undisclosed. The exposed data includes sensitive personally identifiable information (PII) such as names, addresses, dates of birth, and Social Security numbers as well as protected health information (PHI), including medical diagnoses, treatment details, and insurance records. The prolonged duration of unauthorized access suggests a sophisticated compromise of internal systems. AgeRight reported the incident to the Oregon Attorney General’s office on the same day it notified affected individuals. While the company has not released specific details about its response, it has taken steps to secure its systems and prevent further unauthorized access, likely involving cybersecurity professionals to investigate vulnerabilities and strengthen defenses. No responsible party has been identified in connection with the breach.
Description: Consonus Healthcare Services Faces Lawsuit Over Delayed Data Breach Disclosure A former employee of Oregon-based Consonus Healthcare Services has filed a class-action lawsuit against the company, alleging a three-month delay in notifying affected individuals about a data breach that exposed sensitive personal information. The breach, which occurred in early August 2024, compromised the data of approximately 4,800 current and former employees and job applicants, including names, Social Security numbers, and other identifying details. The lawsuit, filed in U.S. District Court in Portland, claims Consonus part of Marquis Companies, a senior living chain failed to implement adequate cybersecurity measures, leaving victims vulnerable to lifelong risks of identity theft and fraud. The company reportedly detected the breach on August 17 but did not notify Oregon’s attorney general or affected individuals until November, nearly three months later. Plaintiff Gaurav Kaushik, a former program manager who worked for Consonus from 2021 to 2024, alleges the company was negligent in securing its systems, failing to monitor for intrusions or comply with industry cybersecurity standards. The stolen data could be exploited for financial fraud, medical identity theft, tax fraud, and other criminal activities, according to the complaint. Consonus offered affected individuals short-term credit monitoring, which the lawsuit dismisses as insufficient given the permanent risks posed by the breach. The notice also allegedly lacked critical details, including the root cause of the breach, exploited vulnerabilities, and remedial actions taken. The lawsuit seeks monetary damages, lifetime credit monitoring, and identity theft insurance for victims. Neither Consonus nor the plaintiffs’ legal representatives have publicly commented on the case. Consonus provides services to rehabilitation and senior care facilities across eight states, including Oregon, Washington, and California.
Description: Marquis Companies Hit by LYNX Ransomware Attack, Exposing Sensitive Health and Personal Data Marquis Companies, a major provider of hospital and healthcare services, suffered a ransomware attack between August 9 and September 10, 2025, resulting in the theft of personally identifiable information (PII) and protected health information (PHI) belonging to current and former residents. The breach was detected on August 17, 2025, though the Oregon Attorney General’s office was not notified until November 21, 2025. The attack was attributed to the LYNX ransomware group, which claimed responsibility and later posted about the breach on the dark web on October 21, 2025. The stolen data included names, addresses, dates of birth, Social Security numbers, medical records, and health insurance details, with potential exposure of additional personal records tied to senior care services. LYNX infiltrated Marquis Companies’ network, exfiltrating sensitive data before encrypting systems a tactic increasingly used to pressure victims into paying ransoms. The group threatened to release or sell the stolen information if demands were not met. Affected individuals were formally notified by mail on November 21, 2025. In response, Marquis Companies initiated an internal investigation and enlisted cybersecurity experts to assess the breach’s scope and reinforce system security. The incident highlights the growing threat of ransomware attacks targeting healthcare providers, where the compromise of PHI and PII can have severe consequences for affected individuals.


No incidents recorded for Consonus Healthcare in 2026.
No incidents recorded for Consonus Healthcare in 2026.
No incidents recorded for Consonus Healthcare in 2026.
Consonus Healthcare cyber incidents detection timeline including parent company and subsidiaries

Consonus Rehab is a contract rehab provider, and part of the Marquis Companies family. Our organizations consist of four major divisions: Consonus Rehab, Consonus Pharmacy, Marquis Companies & AgeRight Care at Home. Consonus supports a culture of integrity and meaningful purpose. Our dedication to physical, mental, social, and spiritual health carries throughout every level of our company, from executives to therapist. Giving back to the community has always been a significant part of the Consonus Rehab philosophy. Bringing the causes we support to the forefront is important to us, and that’s why we’ve formed the Vital Life Foundation. Consonus Rehab and Pharmacy – www.consonushealth.com Marquis and Marquis At Home – www.marquiscompanies.com Vital Life Foundation- www.vitallifefoundation.org Consonus Rehab: Therapy is much more than a job—but you already know that. You’re in the business of making people’s lives better. Consonus Rehab Services is a contract therapy company that sets up therapy departments in post-acute settings. Our employees can find full time, part time or on call/per diem positions working in an acute, outpatient, inpatient or skilled nursing setting. We can help you find the right opportunity where you can make the biggest difference in people’s lives. Consonus Pharmacy: At Consonus Pharmacy we look at ourselves through an atypical lens. We aren’t pill counters, we're people lovers. More than just order fillers, we treat diseases. Every day employees arrive ready to be flawless, ready to serve and ready to make a difference in patients lives. At Consonus, you’ll work with expert and efficient staff, as well as the latest technology to make for a smooth, precise operation and accurate delivery of medications.

IQVIA (NYSE:IQV) is a leading global provider of clinical research services, commercial insights and healthcare intelligence to the life sciences and healthcare industries. IQVIA’s portfolio of solutions are powered by IQVIA Connected Intelligence™ to deliver actionable insights and services built o

Northside Hospital — a certified Great Place To Work® — is one of Georgia’s top health systems. We have acute-care hospitals in Atlanta, Canton, Cumming, Duluth and Lawrenceville and hundreds of outpatient locations across the state. Northside Hospital leads the U.S. in newborn deliveries and is amo

Ochsner Health is the leading nonprofit healthcare provider in Louisiana, Mississippi and across the Gulf South, delivering expert care at its 47 hospitals and more than 370 health and urgent care centers. Ochsner is nationally recognized for inspiring healthier lives and stronger communities thro

Allegheny Health Network is an integrated health care delivery system serving the greater Western Pennsylvania region. More than 2,600 physicians and 21,000 employees serve the system's 14 hospitals as well as its ambulatory medical and surgery centers, Health + Wellness Pavilions, and hundreds of p

The Hospital Authority (HA) is a statutory body established under the Hospital Authority Ordinance in 1990. We have been responsible for managing Hong Kong's public hospitals services since December 1991. We are accountable to the Hong Kong Special Administrative Region Government through the Secret

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues. Wherever and whenever people need us, we help them
Sharp HealthCare is a not-for-profit health care system based in San Diego, California, with four acute care hospitals, three specialty hospitals, three medical groups and a health plan. We provide medical services in virtually all fields of medicine, including primary care, heart care, cancer, orth

UPMC is a world-renowned, nonprofit health care provider and insurer committed to delivering exceptional, people-centered care and community services. Headquartered in Pittsburgh and affiliated with the University of Pittsburgh Schools of the Health Sciences, UPMC is shaping the future of health thr
Headquartered in Arizona, Banner Health is one of the largest nonprofit health care systems in the country. The system owns and operates 33 acute-care hospitals, Banner Health Network, Banner – University Medicine, academic and employed physician groups, long-term care centers, outpatient surgery ce
.png)
Singing River Health System, the largest health system on the Mississippi Gulf Coast, has announced that action has been taken to address a...
Consonus Healthcare Services took three months to alert current and former employees to a hack of their personal information,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Consonus Healthcare is http://www.consonushealth.com.
According to Rankiteo, Consonus Healthcare’s AI-generated cybersecurity score is 694, reflecting their Weak security posture.
According to Rankiteo, Consonus Healthcare currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Consonus Healthcare has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Consonus Healthcare is not certified under SOC 2 Type 1.
According to Rankiteo, Consonus Healthcare does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Consonus Healthcare is not listed as GDPR compliant.
According to Rankiteo, Consonus Healthcare does not currently maintain PCI DSS compliance.
According to Rankiteo, Consonus Healthcare is not compliant with HIPAA regulations.
According to Rankiteo,Consonus Healthcare is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Consonus Healthcare operates primarily in the Hospitals and Health Care industry.
Consonus Healthcare employs approximately 901 people worldwide.
Consonus Healthcare presently has no subsidiaries across any sectors.
Consonus Healthcare’s official LinkedIn profile has approximately 5,351 followers.
Consonus Healthcare is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Consonus Healthcare does not have a profile on Crunchbase.
Yes, Consonus Healthcare maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/consonus-healthcare.
As of January 23, 2026, Rankiteo reports that Consonus Healthcare has experienced 3 cybersecurity incidents.
Consonus Healthcare has an estimated 31,602 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and third party assistance with cybersecurity professionals, and remediation measures with internal investigation and system security assessment, and communication strategy with formal notification to impacted individuals by mail on nov. 21, 2025, and third party assistance with cybersecurity professionals, and law enforcement notified with oregon attorney general’s office, and containment measures with secured systems to prevent further unauthorized access, and communication strategy with notified affected individuals on 2025-11-21, and communication strategy with delayed notification to affected individuals and oregon’s attorney general..
Title: Marquis Companies Data Breach and Ransomware Attack
Description: Marquis Companies, a leading provider in the hospital and health care industry, experienced a significant data breach involving personally identifiable information (PII) and protected health information (PHI) of current and former residents. The breach was caused by a ransomware attack carried out by the LYNX group.
Date Detected: 2025-08-17
Date Publicly Disclosed: 2025-11-21
Type: Ransomware Attack
Threat Actor: LYNX ransomware group
Motivation: Financial gain, data extortion
Title: AgeRight Clinical Services Data Breach
Description: AgeRight Clinical Services, a healthcare provider specializing in senior care, discovered a significant data breach affecting nearly 5,000 individuals. The breach involved unauthorized access to sensitive information, including personally identifiable information (PII) and protected health information (PHI).
Date Detected: 2025-08-17
Date Publicly Disclosed: 2025-11-21
Type: Data Breach
Title: Consonus Healthcare Services Data Breach
Description: Consonus Healthcare Services experienced a data breach in early August, compromising personal information of current and former employees and job applicants. The company took three months to notify affected individuals, putting them at risk of identity theft and fraud.
Date Detected: 2024-08-17
Date Publicly Disclosed: 2024-11-00
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Personally identifiable information (PII) and protected health information (PHI)
Brand Reputation Impact: Likely significant
Legal Liabilities: Potential
Identity Theft Risk: High

Data Compromised: Personally identifiable information (PII) and protected health information (PHI)
Identity Theft Risk: High

Data Compromised: Names, Social Security numbers, and other personal information
Brand Reputation Impact: Negative impact due to delayed notification and inadequate security measures
Legal Liabilities: Lawsuit filed for negligence and recklessness in data security
Identity Theft Risk: High risk of identity theft and fraud for affected individuals
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi), , Personally Identifiable Information (Pii), Protected Health Information (Phi), , Names, Social Security Numbers, Personal Information and .

Entity Name: Marquis Companies
Entity Type: Healthcare Provider
Industry: Hospital & Health Care
Customers Affected: Current and former residents

Entity Name: AgeRight Clinical Services
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 4897

Entity Name: Consonus Healthcare Services
Entity Type: Healthcare Services and Consulting
Industry: Healthcare
Location: Oregon, USA
Customers Affected: 4800

Incident Response Plan Activated: Yes
Third Party Assistance: Cybersecurity professionals
Remediation Measures: Internal investigation and system security assessment
Communication Strategy: Formal notification to impacted individuals by mail on Nov. 21, 2025

Third Party Assistance: Cybersecurity professionals
Law Enforcement Notified: Oregon Attorney General’s office
Containment Measures: Secured systems to prevent further unauthorized access
Communication Strategy: Notified affected individuals on 2025-11-21

Communication Strategy: Delayed notification to affected individuals and Oregon’s attorney general
Incident Response Plan: The company's incident response plan is described as Yes.
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity professionals, Cybersecurity professionals.

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Sensitivity of Data: High
Data Exfiltration: Yes
Data Encryption: Yes (by attackers)
Personally Identifiable Information: NamesAddressesDates of birthSocial Security numbersMedical informationHealth insurance details

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: 4897
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesDates of birthSocial Security numbersMedical diagnosesTreatment detailsInsurance information

Type of Data Compromised: Names, Social security numbers, Personal information
Number of Records Exposed: 4800
Sensitivity of Data: High
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Internal investigation and system security assessment.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by secured systems to prevent further unauthorized access.

Ransomware Strain: LYNX
Data Encryption: Yes
Data Exfiltration: Yes

Regulations Violated: HIPAA (likely),
Regulatory Notifications: Oregon Attorney General’s office (Nov. 21, 2025)

Regulatory Notifications: Oregon Attorney General’s office

Regulations Violated: Industry standards, Federal regulations on cybersecurity,
Legal Actions: Lawsuit filed in U.S. District Court in Portland
Regulatory Notifications: Notified Oregon’s attorney general
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuit filed in U.S. District Court in Portland.

Source: Oregon Attorney General’s office disclosure

Source: Dark web post by LYNX group

Source: Oregon Attorney General’s office

Source: The Oregonian
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Oregon Attorney General’s office disclosure, and Source: Dark web post by LYNX group, and Source: Oregon Attorney General’s office, and Source: The Oregonian.

Investigation Status: Ongoing

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Formal notification to impacted individuals by mail on Nov. 21, 2025, Notified affected individuals on 2025-11-21 and Delayed notification to affected individuals and Oregon’s attorney general.

Customer Advisories: Formal notification to impacted individuals by mail on Nov. 21, 2025

Customer Advisories: Notified affected individuals on 2025-11-21

Customer Advisories: Offered short-term credit monitoring to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Formal notification to impacted individuals by mail on Nov. 21, 2025, Notified affected individuals on 2025-11-21 and Offered short-term credit monitoring to affected individuals.

Corrective Actions: Enhanced security protocols

Root Causes: Inadequate data security system, failure to monitor security systems for intrusion, non-compliance with industry standards and federal regulations
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity professionals, Cybersecurity professionals.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced security protocols.
Last Attacking Group: The attacking group in the last incident was an LYNX ransomware group.
Most Recent Incident Detected: The most recent incident detected was on 2025-08-17.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-11-00.
Most Significant Data Compromised: The most significant data compromised in an incident were Personally identifiable information (PII) and protected health information (PHI), Personally identifiable information (PII) and protected health information (PHI), Names, Social Security numbers and and other personal information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybersecurity professionals, Cybersecurity professionals.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Secured systems to prevent further unauthorized access.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Social Security numbers, and other personal information and Personally identifiable information (PII) and protected health information (PHI).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 976.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuit filed in U.S. District Court in Portland.
Most Recent Source: The most recent source of information about an incident are The Oregonian, Oregon Attorney General’s office, Dark web post by LYNX group and Oregon Attorney General’s office disclosure.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Formal notification to impacted individuals by mail on Nov. 21, 2025, Notified affected individuals on 2025-11-21 and Offered short-term credit monitoring to affected individuals.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.